• i removed this malvare code from my sites index.php tops including admin/index.php as well .

    [Code moderated.]

    but it is still comming up again and again.
    Any idea how i can get rid of it.
    thanks

Viewing 15 replies - 1 through 15 (of 21 total)
  • Same here.. I delete it and it comes right back :/

    Seen a similar issue, and traced it to what appears to be a brute force attack on logging into wordpress (thousands of POST /wp-login.php from the same IP in access_log), and then access to the /wp-admin/theme-editor.php which proceeded to GET /wp-admin/theme-editor.php?file=/themes/classic/comments.php&theme=WordPress+Classic&dir=theme and then post a new one. That is the root program that updates the other files.

    After removing any additional php code you missed, to fix (search access to wp-admin in access_log), restrict wp-login.php, or at least /wp-admin/ to trusted IPs.

    Having site under version control also helps identify any changed files.

    Sorry, never meant to imply you can. The main fix was to lock down the point of entry not to just revert the files.

    That said, some of the steps listed in those are just shotgun approaches for if you don’t know how the files were altered, and don’t have some good way such as version control or differential backup comparison to tell what was altered, or log analysis tools, etc…

    You should still rebuild the server, change all the passwords, etc… However sometimes it’s important to stop the problem and schedule the rest a little later.

    Just taking an immediate shotgun approach isn’t perfect either, because if you are dealing with a 0 day exploit, you could be just as open after all that work of rebuilding. So it is still important to figure out what happened and know how to to block it.

    Warning: Something’s Not Right Here!
    xxxxMY-WESBITExxxxxx.com contains content from jqbttmjdxx.ddns.ms, a site known to distribute malware. Your computer might catch a virus if you visit this site.
    Google has found malicious software may be installed onto your computer if you proceed. If you’ve visited this site in the past or you trust this site, it’s possible that it has just recently been compromised by a hacker. You should not proceed, and perhaps try again tomorrow or go somewhere else.
    We have already notified jqbttmjdxx.ddns.ms that we found malware on the site. For more about the problems found on jqbttmjdxx.ddns.ms, visit the Google Safe Browsing diagnostic page.

    On Sun, Feb 19, 2012 at 4:55 PM, WordPress <[email protected]> wrote:

    This notice is to inform you that someone at IP address 216.21.58.26 tried to login to your site “MY WORDPRES BLOG” and failed.

    The targeted username was Admin

    The IP address has been blocked for 60 minutes.

    we recorded 4 different IP’s trying to access our “admin” account. only one (that we know of) got through.

    Moderator Ipstenu (Mika Epstein)

    (@ipstenu)

    ?????? Advisor and Activist

    Deleted the <script> stuff as you’re making the spam filter flip out.

    Please post that one PASTEBIN.COM

    Here is information regarding that specific malware… At the bottom there is a removal guide that helped me out.

    [Link removed]

    If all else fails, the company that wrote the article removes malware.

    J0nnyboy- that site has malware in it.

    Where did this post go? [edit] Nevermind :^)

    tburdeinei wrote:

    J0nnyboy- that site has malware in it.

    tburdeinei is correct.

    The site does not contain malware.. The content in the post contains snippets which are wrapped in code blocks.

    It’s not even reported.

    esmi, all sucuri does is parse the page… if that was truly a malware infection it would not even be able to read that, because that code snippet is written in php and wrapped in code tags. Sucuri can only detect client side malware and compare domain hashes to Google Safe Browsing API.

    The site is clean.

    It also set off my virus software – Exploit:JS/Blacole.BV

    I just verified j0hnnyb0ys statement by wget and reading the code. It is the exploit code, but not active- wrapped in code blocks so you can see an actual example of what you are looking for. your (and my) antivirus/malware software isn’t smart enough to tell that its not going to be parsed and run by the browser.

Viewing 15 replies - 1 through 15 (of 21 total)
  • The topic ‘malware issue’ is closed to new replies.